FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2022-02-26.q471 Dumps
  • ««
  • «
  • …
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • …
  • »
  • »»
Download Now

Question 161

Everything not explicitly permitted is forbidden has which of the following kinds of tradeoff?

Correct Answer: A
"Everything not explicitly permitted is forbidden (default deny) improves security at a cost in functionality. This is a good approach if you have lots of security threats. On the other hand., ""Everything not explicitly forbidden is permitted"" (default permit) allows greater functionality by sacrificing security. This is only a good approach in an environment where security threats are non- existent or negligible."
insert code

Question 162

Which of the following antispam filtering techniques would BEST prevent a valid, variable- length e-mail
message containing a heavily weighted spam keyword from being labeled as spam?

Correct Answer: D
Section: Protection of Information Assets
Explanation:
Bayesian filtering applies statistical modeling to messages, by performing a frequency analysis on each
word within the message and then evaluating the message as a whole. Therefore, it can ignore a
suspicious keyword if the entire message is within normal bounds. Heuristic filtering is less effective, since
new exception rules may need to be defined when a valid message is labeled as spam. Signature-based
filtering is useless against variable- length messages, because the calculated MD5 hash changes all the
time. Finally, pattern matching is actually a degraded rule- based technique, where the rules operate at the
word level using wildcards, and not at higher levels.
insert code

Question 163

While evaluating logical access control the IS auditor should follow all of the steps mentioned below EXCEPT one?
1. Obtain general understanding of security risk facing information processing, through a review of relevant documentation, inquiry and observation,etc
2. Document and evaluate controls over potential access paths into the system to assess their adequacy, efficiency and effectiveness
3. Test Control over access paths to determine whether they are functioning and effective by applying appropriate audit technique
4. Evaluate the access control environment to determine if the control objective are achieved by analyzing test result and other audit evidence
5. Evaluate the security environment to assess its adequacy by reviewing written policies, observing practices and procedures, and comparing them with appropriate security standard or practice and procedures used by other organization.
6. Evaluate and deploy technical controls to mitigate all identified risks during audit.

Correct Answer: D
Explanation/Reference:
The word EXCEPT is the keyword used in the question. You need find out the item an IS auditor should not perform while evaluating logical access control. It is not an IT auditor's responsibility to evaluate and deploy technical controls to mitigate all identified risks during audit.
For CISA exam you should know below information about auditing logical access:
Obtain general understanding of security risk facing information processing, through a review of relevant documentation, inquiry and observation,etc
Document and evaluate controls over potential access paths into the system to assess their adequacy, efficiency and effectiveness
Test Control over access paths to determine whether they are functioning and effective by applying appropriate audit technique
Evaluate the access control environment to determine if the control objective are achieved by analyzing test result and other audit evidence
Evaluate the security environment to assess its adequacy by reviewing written policies, observing practices and procedures, and comparing them with appropriate security standard or practice and procedures used by other organization.
The following were incorrect answers:
The other options presented are valid choices which IS auditor needs to follow while evaluating logical access control.
The following reference(s) were/was used to create this question:
CISA review manual 2014 Page number362
insert code

Question 164

An IS auditor finds multiple situations where the help desk resolved security incidents without notifying IT
security as required by policy. Which of the following is the BEST audit recommendation?

Correct Answer: B
Section: Protection of Information Assets
insert code

Question 165

During business process reengineering (BPR) of a bank's teller activities, an IS auditor should evaluate:

Correct Answer: A
insert code
  • ««
  • «
  • …
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2022-02-26.q471 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.